Cryptomining Malware, Fake PoC Exploit, Malicious Browser Extensions, and Palo Alto Vuln (

Поделиться
HTML-код
  • Опубликовано: 8 фев 2025
  • Cryptomining Malware, Fake PoC Exploit, Malicious Browser Extensions, and Palo Alto Vulnerabilities
    In this episode, we explore the following stories:
    "Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics"
    Overview of Redtail's multi-architecture cryptomining malware exploiting vulnerabilities and deploying persistence techniques.
    URL: Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics
    "Information Stealer Masquerades as LDAPNightmare PoC Exploit"
    A malware disguised as a PoC exploit targets users seeking to test vulnerabilities like LDAPNightmare.
    URL: Information Stealer Masquerades as LDAPNightmare PoC Exploit
    "How Extensions Trick CWS Search"
    Research reveals how malicious browser extensions manipulate Chrome Web Store search to appear legitimate.
    URL: How Extensions Trick CWS Search
    "Palo Alto Networks' Expedition Vulnerabilities (PAN-SA-2025-0001)"
    Multiple vulnerabilities in the deprecated Expedition tool can expose credentials and lead to unauthorized file and command execution.
    URL: Palo Alto Networks' Expedition Vulnerabilities (PAN-SA-2025-0001)
    keywords: palo alto; chrome web store; extensions; chrome; google; fake exploits; ldap; cryptomining; redtail

Комментарии • 4